@@ -199,62 +199,6 @@ def test_show_vmss_instance_view(self, factory_mock):
199199 resource_group_name = 'rg1' , virtual_machine_scale_set_name = 'vmss1' ,
200200 select = 'instanceView' , expand = 'instanceView' )
201201
202- # pylint: disable=line-too-long
203- @mock .patch ('azure.cli.command_modules.vm.disk_encryption._compute_client_factory' , autospec = True )
204- @mock .patch ('azure.cli.command_modules.vm.disk_encryption._get_keyvault_key_url' , autospec = True )
205- def test_enable_encryption_error_cases_handling (self , mock_get_keyvault_key_url , mock_compute_client_factory ):
206- faked_keyvault = '/subscriptions/01234567-1bf0-4dda-aec3-cb9272f09590/resourceGroups/rg1/providers/Microsoft.KeyVault/vaults/v1'
207- os_disk = OSDisk (create_option = None , os_type = OperatingSystemTypes .linux )
208- existing_disk = DataDisk (lun = 1 , vhd = 'https://someuri' , name = 'd1' , create_option = DiskCreateOptionTypes .empty )
209- vm = FakedVM (None , [existing_disk ], os_disk = os_disk )
210- cmd = _get_test_cmd ()
211-
212- compute_client_mock = mock .MagicMock ()
213- compute_client_mock .virtual_machines .get .return_value = vm
214- mock_compute_client_factory .return_value = compute_client_mock
215-
216- mock_get_keyvault_key_url .return_value = 'https://somevaults.vault.azure.net/'
217-
218- # throw when VM has disks, but no --volume-type is specified
219- with self .assertRaises (CLIError ) as context :
220- encrypt_vm (cmd , 'rg1' , 'vm1' , 'client_id' , faked_keyvault , 'client_secret' )
221-
222- self .assertTrue ("supply --volume-type" in str (context .exception ))
223-
224- # throw when no AAD client secrets
225- with self .assertRaises (CLIError ) as context :
226- encrypt_vm (cmd , 'rg1' , 'vm1' , 'client_id' , faked_keyvault )
227-
228- self .assertTrue ("--aad-client-cert-thumbprint or --aad-client-secret" in str (context .exception ))
229-
230- @mock .patch ('azure.cli.command_modules.vm.disk_encryption.set_vm' , autospec = True )
231- @mock .patch ('azure.cli.command_modules.vm.disk_encryption._compute_client_factory' , autospec = True )
232- def test_disable_encryption_error_cases_handling (self , mock_compute_client_factory , mock_vm_set ): # pylint: disable=unused-argument
233- os_disk = OSDisk (create_option = None , os_type = OperatingSystemTypes .linux )
234- existing_disk = DataDisk (lun = 1 , vhd = 'https://someuri' , name = 'd1' , create_option = DiskCreateOptionTypes .empty )
235- vm = FakedVM (None , [existing_disk ], os_disk = os_disk )
236- cmd = _get_test_cmd ()
237- vm_extension = VirtualMachineExtension (location = 'westus' ,
238- settings = {'SequenceVersion' : 1 },
239- instance_view = VirtualMachineExtensionInstanceView (
240- statuses = [InstanceViewStatus (message = 'Encryption completed successfully' )],
241- substatuses = [InstanceViewStatus (message = '{"os":"Encrypted"}' )]))
242- vm_extension .provisioning_state = 'Succeeded'
243- compute_client_mock = mock .MagicMock ()
244- compute_client_mock .virtual_machines .get .return_value = vm
245- compute_client_mock .virtual_machine_extensions .get .return_value = vm_extension
246- mock_compute_client_factory .return_value = compute_client_mock
247-
248- # throw on disabling encryption on OS disk of a linux VM
249- with self .assertRaises (CLIError ):
250- decrypt_vm (cmd , 'rg1' , 'vm1' , 'OS' )
251-
252- # self.assertTrue("Only Data disks can have encryption disabled in a Linux VM." in str(context.exception))
253-
254- # works fine to disable encryption on daat disk when OS disk is never encrypted
255- vm_extension .instance_view .substatuses [0 ].message = '{}'
256- decrypt_vm (cmd , 'rg1' , 'vm1' , 'DATA' )
257-
258202 def test_merge_secrets (self ):
259203 secret1 = [{
260204 'sourceVault' : {'id' : '123' },
0 commit comments